This commit is contained in:
parent
e73c39a71d
commit
74c392523d
20 changed files with 81 additions and 88 deletions
|
|
@ -1,9 +1,6 @@
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
annotations:
|
|
||||||
controller-gen.kubebuilder.io/version: (devel)
|
|
||||||
creationTimestamp: null
|
|
||||||
name: bgpconfigurations.crd.projectcalico.org
|
name: bgpconfigurations.crd.projectcalico.org
|
||||||
spec:
|
spec:
|
||||||
group: crd.projectcalico.org
|
group: crd.projectcalico.org
|
||||||
|
|
|
||||||
|
|
@ -1,9 +1,6 @@
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
annotations:
|
|
||||||
controller-gen.kubebuilder.io/version: (devel)
|
|
||||||
creationTimestamp: null
|
|
||||||
name: bgppeers.crd.projectcalico.org
|
name: bgppeers.crd.projectcalico.org
|
||||||
spec:
|
spec:
|
||||||
group: crd.projectcalico.org
|
group: crd.projectcalico.org
|
||||||
|
|
@ -38,6 +35,7 @@ spec:
|
||||||
format: int32
|
format: int32
|
||||||
type: integer
|
type: integer
|
||||||
keepOriginalNextHop:
|
keepOriginalNextHop:
|
||||||
|
default: false
|
||||||
description: Option to keep the original nexthop field when routes
|
description: Option to keep the original nexthop field when routes
|
||||||
are sent to a BGP Peer. Setting "true" configures the selected BGP
|
are sent to a BGP Peer. Setting "true" configures the selected BGP
|
||||||
Peers node to use the "next hop keep;" instead of "next hop self;"(default)
|
Peers node to use the "next hop keep;" instead of "next hop self;"(default)
|
||||||
|
|
@ -45,8 +43,8 @@ spec:
|
||||||
type: boolean
|
type: boolean
|
||||||
node:
|
node:
|
||||||
description: The node name identifying the Calico node instance that
|
description: The node name identifying the Calico node instance that
|
||||||
is peering with this peer. If this is not set, this represents a
|
is targeted by this peer. If this is not set, and no nodeSelector
|
||||||
global peer, i.e. a peer that peers with every node in the deployment.
|
is specified, then this BGP peer selects all nodes in the cluster.
|
||||||
type: string
|
type: string
|
||||||
nodeSelector:
|
nodeSelector:
|
||||||
description: Selector for the nodes that should have this peering. When
|
description: Selector for the nodes that should have this peering. When
|
||||||
|
|
@ -88,12 +86,9 @@ spec:
|
||||||
peering between the local node and selected remote nodes, we configure
|
peering between the local node and selected remote nodes, we configure
|
||||||
an IPv4 peering if both ends have NodeBGPSpec.IPv4Address specified,
|
an IPv4 peering if both ends have NodeBGPSpec.IPv4Address specified,
|
||||||
and an IPv6 peering if both ends have NodeBGPSpec.IPv6Address specified. The
|
and an IPv6 peering if both ends have NodeBGPSpec.IPv6Address specified. The
|
||||||
remote AS number comes from the remote node’s NodeBGPSpec.ASNumber,
|
remote AS number comes from the remote node's NodeBGPSpec.ASNumber,
|
||||||
or the global default if that is not set.
|
or the global default if that is not set.
|
||||||
type: string
|
type: string
|
||||||
required:
|
|
||||||
- asNumber
|
|
||||||
- peerIP
|
|
||||||
type: object
|
type: object
|
||||||
type: object
|
type: object
|
||||||
served: true
|
served: true
|
||||||
|
|
|
||||||
|
|
@ -1,9 +1,6 @@
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
annotations:
|
|
||||||
controller-gen.kubebuilder.io/version: (devel)
|
|
||||||
creationTimestamp: null
|
|
||||||
name: blockaffinities.crd.projectcalico.org
|
name: blockaffinities.crd.projectcalico.org
|
||||||
spec:
|
spec:
|
||||||
group: crd.projectcalico.org
|
group: crd.projectcalico.org
|
||||||
|
|
|
||||||
|
|
@ -10,12 +10,11 @@ data:
|
||||||
typha_service_name: "none"
|
typha_service_name: "none"
|
||||||
# Configure the backend to use.
|
# Configure the backend to use.
|
||||||
calico_backend: "vxlan"
|
calico_backend: "vxlan"
|
||||||
|
|
||||||
# Configure the MTU to use for workload interfaces and tunnels.
|
# Configure the MTU to use for workload interfaces and tunnels.
|
||||||
# - If Wireguard is enabled, set to your network MTU - 60
|
# By default, MTU is auto-detected, and explicitly setting this field should not be required.
|
||||||
# - Otherwise, if VXLAN or BPF mode is enabled, set to your network MTU - 50
|
# You can override auto-detection by providing a non-zero value.
|
||||||
# - Otherwise, if IPIP is enabled, set to your network MTU - 20
|
veth_mtu: "0"
|
||||||
# - Otherwise, if not using any encapsulation, set to your network MTU.
|
|
||||||
veth_mtu: "1440"
|
|
||||||
|
|
||||||
# The CNI network configuration to install on each node. The special
|
# The CNI network configuration to install on each node. The special
|
||||||
# values in this config will be automatically populated.
|
# values in this config will be automatically populated.
|
||||||
|
|
|
||||||
|
|
@ -34,7 +34,7 @@ spec:
|
||||||
priorityClassName: system-cluster-critical
|
priorityClassName: system-cluster-critical
|
||||||
containers:
|
containers:
|
||||||
- name: calico-kube-controllers
|
- name: calico-kube-controllers
|
||||||
image: calico/kube-controllers:v3.16.5
|
image: docker.io/calico/kube-controllers:v3.17.0
|
||||||
env:
|
env:
|
||||||
# Choose which controllers to run.
|
# Choose which controllers to run.
|
||||||
- name: ENABLED_CONTROLLERS
|
- name: ENABLED_CONTROLLERS
|
||||||
|
|
|
||||||
16
files/calico-kube-controllers-PodDisruptionBudget.yaml
Normal file
16
files/calico-kube-controllers-PodDisruptionBudget.yaml
Normal file
|
|
@ -0,0 +1,16 @@
|
||||||
|
|
||||||
|
# This manifest creates a Pod Disruption Budget for Controller to allow K8s Cluster Autoscaler to evict
|
||||||
|
|
||||||
|
apiVersion: policy/v1beta1
|
||||||
|
kind: PodDisruptionBudget
|
||||||
|
metadata:
|
||||||
|
name: calico-kube-controllers
|
||||||
|
namespace: kube-system
|
||||||
|
labels:
|
||||||
|
k8s-app: calico-kube-controllers
|
||||||
|
spec:
|
||||||
|
maxUnavailable: 1
|
||||||
|
selector:
|
||||||
|
matchLabels:
|
||||||
|
k8s-app: calico-kube-controllers
|
||||||
|
|
||||||
|
|
@ -44,7 +44,7 @@ spec:
|
||||||
# It can be deleted if this is a fresh installation, or if you have already
|
# It can be deleted if this is a fresh installation, or if you have already
|
||||||
# upgraded to use calico-ipam.
|
# upgraded to use calico-ipam.
|
||||||
- name: upgrade-ipam
|
- name: upgrade-ipam
|
||||||
image: calico/cni:v3.16.5
|
image: docker.io/calico/cni:v3.17.0
|
||||||
command: ["/opt/cni/bin/calico-ipam", "-upgrade"]
|
command: ["/opt/cni/bin/calico-ipam", "-upgrade"]
|
||||||
envFrom:
|
envFrom:
|
||||||
- configMapRef:
|
- configMapRef:
|
||||||
|
|
@ -71,7 +71,7 @@ spec:
|
||||||
# This container installs the CNI binaries
|
# This container installs the CNI binaries
|
||||||
# and CNI network config file on each node.
|
# and CNI network config file on each node.
|
||||||
- name: install-cni
|
- name: install-cni
|
||||||
image: calico/cni:v3.16.5
|
image: docker.io/calico/cni:v3.17.0
|
||||||
command: ["/opt/cni/bin/install"]
|
command: ["/opt/cni/bin/install"]
|
||||||
envFrom:
|
envFrom:
|
||||||
- configMapRef:
|
- configMapRef:
|
||||||
|
|
@ -112,7 +112,7 @@ spec:
|
||||||
# Adds a Flex Volume Driver that creates a per-pod Unix Domain Socket to allow Dikastes
|
# Adds a Flex Volume Driver that creates a per-pod Unix Domain Socket to allow Dikastes
|
||||||
# to communicate with Felix over the Policy Sync API.
|
# to communicate with Felix over the Policy Sync API.
|
||||||
- name: flexvol-driver
|
- name: flexvol-driver
|
||||||
image: calico/pod2daemon-flexvol:v3.16.5
|
image: docker.io/calico/pod2daemon-flexvol:v3.17.0
|
||||||
volumeMounts:
|
volumeMounts:
|
||||||
- name: flexvol-driver-host
|
- name: flexvol-driver-host
|
||||||
mountPath: /host/driver
|
mountPath: /host/driver
|
||||||
|
|
@ -123,7 +123,7 @@ spec:
|
||||||
# container programs network policy and routes on each
|
# container programs network policy and routes on each
|
||||||
# host.
|
# host.
|
||||||
- name: calico-node
|
- name: calico-node
|
||||||
image: calico/node:v3.16.5
|
image: docker.io/calico/node:v3.17.0
|
||||||
envFrom:
|
envFrom:
|
||||||
- configMapRef:
|
- configMapRef:
|
||||||
# Allow KUBERNETES_SERVICE_HOST and KUBERNETES_SERVICE_PORT to be overridden for eBPF mode.
|
# Allow KUBERNETES_SERVICE_HOST and KUBERNETES_SERVICE_PORT to be overridden for eBPF mode.
|
||||||
|
|
@ -239,6 +239,9 @@ spec:
|
||||||
# Bidirectional means that, if we mount the BPF filesystem at /sys/fs/bpf it will propagate to the host.
|
# Bidirectional means that, if we mount the BPF filesystem at /sys/fs/bpf it will propagate to the host.
|
||||||
# If the host is known to mount that filesystem already then Bidirectional can be omitted.
|
# If the host is known to mount that filesystem already then Bidirectional can be omitted.
|
||||||
mountPropagation: Bidirectional
|
mountPropagation: Bidirectional
|
||||||
|
- name: cni-log-dir
|
||||||
|
mountPath: /var/log/calico/cni
|
||||||
|
readOnly: true
|
||||||
volumes:
|
volumes:
|
||||||
# Used by calico-node.
|
# Used by calico-node.
|
||||||
- name: lib-modules
|
- name: lib-modules
|
||||||
|
|
@ -265,6 +268,10 @@ spec:
|
||||||
- name: cni-net-dir
|
- name: cni-net-dir
|
||||||
hostPath:
|
hostPath:
|
||||||
path: /etc/cni/net.d
|
path: /etc/cni/net.d
|
||||||
|
# Used to access CNI logs.
|
||||||
|
- name: cni-log-dir
|
||||||
|
hostPath:
|
||||||
|
path: /var/log/calico/cni
|
||||||
# Mount in the directory for host-local IPAM allocations. This is
|
# Mount in the directory for host-local IPAM allocations. This is
|
||||||
# used when upgrading from host-local to calico-ipam, and can be removed
|
# used when upgrading from host-local to calico-ipam, and can be removed
|
||||||
# if not using the upgrade-ipam init container.
|
# if not using the upgrade-ipam init container.
|
||||||
|
|
|
||||||
|
|
@ -1,9 +1,6 @@
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
annotations:
|
|
||||||
controller-gen.kubebuilder.io/version: (devel)
|
|
||||||
creationTimestamp: null
|
|
||||||
name: clusterinformations.crd.projectcalico.org
|
name: clusterinformations.crd.projectcalico.org
|
||||||
spec:
|
spec:
|
||||||
group: crd.projectcalico.org
|
group: crd.projectcalico.org
|
||||||
|
|
|
||||||
|
|
@ -1,9 +1,6 @@
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
annotations:
|
|
||||||
controller-gen.kubebuilder.io/version: (devel)
|
|
||||||
creationTimestamp: null
|
|
||||||
name: felixconfigurations.crd.projectcalico.org
|
name: felixconfigurations.crd.projectcalico.org
|
||||||
spec:
|
spec:
|
||||||
group: crd.projectcalico.org
|
group: crd.projectcalico.org
|
||||||
|
|
@ -62,13 +59,13 @@ spec:
|
||||||
true]'
|
true]'
|
||||||
type: boolean
|
type: boolean
|
||||||
bpfDataIfacePattern:
|
bpfDataIfacePattern:
|
||||||
description: 'BPFDataIfacePattern is a regular expression that controls
|
description: BPFDataIfacePattern is a regular expression that controls
|
||||||
which interfaces Felix should attach BPF programs to in order to
|
which interfaces Felix should attach BPF programs to in order to
|
||||||
catch traffic to/from the network. This needs to match the interfaces
|
catch traffic to/from the network. This needs to match the interfaces
|
||||||
that Calico workload traffic flows over as well as any interfaces
|
that Calico workload traffic flows over as well as any interfaces
|
||||||
that handle incoming traffic to nodeports and services from outside
|
that handle incoming traffic to nodeports and services from outside
|
||||||
the cluster. It should not match the workload interfaces (usually
|
the cluster. It should not match the workload interfaces (usually
|
||||||
named cali...). [Default: ^(en.*|eth.*|tunl0$)]'
|
named cali...).
|
||||||
type: string
|
type: string
|
||||||
bpfDisableUnprivileged:
|
bpfDisableUnprivileged:
|
||||||
description: 'BPFDisableUnprivileged, if enabled, Felix sets the kernel.unprivileged_bpf_disabled
|
description: 'BPFDisableUnprivileged, if enabled, Felix sets the kernel.unprivileged_bpf_disabled
|
||||||
|
|
@ -113,10 +110,10 @@ spec:
|
||||||
`tc exec bpf debug`. [Default: Off].'
|
`tc exec bpf debug`. [Default: Off].'
|
||||||
type: string
|
type: string
|
||||||
chainInsertMode:
|
chainInsertMode:
|
||||||
description: 'ChainInsertMode controls whether Felix hooks the kernel’s
|
description: 'ChainInsertMode controls whether Felix hooks the kernel''s
|
||||||
top-level iptables chains by inserting a rule at the top of the
|
top-level iptables chains by inserting a rule at the top of the
|
||||||
chain or by appending a rule at the bottom. insert is the safe default
|
chain or by appending a rule at the bottom. insert is the safe default
|
||||||
since it prevents Calico’s rules from being bypassed. If you switch
|
since it prevents Calico''s rules from being bypassed. If you switch
|
||||||
to append mode, be sure that the other rules in the chains signal
|
to append mode, be sure that the other rules in the chains signal
|
||||||
acceptance by falling through to the Calico rules, otherwise the
|
acceptance by falling through to the Calico rules, otherwise the
|
||||||
Calico policy will be bypassed. [Default: insert]'
|
Calico policy will be bypassed. [Default: insert]'
|
||||||
|
|
@ -198,7 +195,7 @@ spec:
|
||||||
Each port should be specified as tcp:<port-number> or udp:<port-number>.
|
Each port should be specified as tcp:<port-number> or udp:<port-number>.
|
||||||
For back-compatibility, if the protocol is not specified, it defaults
|
For back-compatibility, if the protocol is not specified, it defaults
|
||||||
to “tcp”. To disable all outbound host ports, use the value none.
|
to “tcp”. To disable all outbound host ports, use the value none.
|
||||||
The default value opens etcd’s standard ports to ensure that Felix
|
The default value opens etcd''s standard ports to ensure that Felix
|
||||||
does not get cut off from etcd as well as allowing DHCP and DNS.
|
does not get cut off from etcd as well as allowing DHCP and DNS.
|
||||||
[Default: tcp:179, tcp:2379, tcp:2380, tcp:6443, tcp:6666, tcp:6667,
|
[Default: tcp:179, tcp:2379, tcp:2380, tcp:6443, tcp:6666, tcp:6667,
|
||||||
udp:53, udp:67]'
|
udp:53, udp:67]'
|
||||||
|
|
@ -250,8 +247,8 @@ spec:
|
||||||
workload endpoints and so distinguishes them from host endpoint
|
workload endpoints and so distinguishes them from host endpoint
|
||||||
interfaces. Note: in environments other than bare metal, the orchestrators
|
interfaces. Note: in environments other than bare metal, the orchestrators
|
||||||
configure this appropriately. For example our Kubernetes and Docker
|
configure this appropriately. For example our Kubernetes and Docker
|
||||||
integrations set the ‘cali’ value, and our OpenStack integration
|
integrations set the ''cali'' value, and our OpenStack integration
|
||||||
sets the ‘tap’ value. [Default: cali]'
|
sets the ''tap'' value. [Default: cali]'
|
||||||
type: string
|
type: string
|
||||||
interfaceRefreshInterval:
|
interfaceRefreshInterval:
|
||||||
description: InterfaceRefreshInterval is the period at which Felix
|
description: InterfaceRefreshInterval is the period at which Felix
|
||||||
|
|
@ -267,7 +264,7 @@ spec:
|
||||||
ipsetsRefreshInterval:
|
ipsetsRefreshInterval:
|
||||||
description: 'IpsetsRefreshInterval is the period at which Felix re-checks
|
description: 'IpsetsRefreshInterval is the period at which Felix re-checks
|
||||||
all iptables state to ensure that no other process has accidentally
|
all iptables state to ensure that no other process has accidentally
|
||||||
broken Calico’s rules. Set to 0 to disable iptables refresh. [Default:
|
broken Calico''s rules. Set to 0 to disable iptables refresh. [Default:
|
||||||
90s]'
|
90s]'
|
||||||
type: string
|
type: string
|
||||||
iptablesBackend:
|
iptablesBackend:
|
||||||
|
|
@ -279,7 +276,7 @@ spec:
|
||||||
iptablesLockFilePath:
|
iptablesLockFilePath:
|
||||||
description: 'IptablesLockFilePath is the location of the iptables
|
description: 'IptablesLockFilePath is the location of the iptables
|
||||||
lock file. You may need to change this if the lock file is not in
|
lock file. You may need to change this if the lock file is not in
|
||||||
its standard location (for example if you have mapped it into Felix’s
|
its standard location (for example if you have mapped it into Felix''s
|
||||||
container at a different path). [Default: /run/xtables.lock]'
|
container at a different path). [Default: /run/xtables.lock]'
|
||||||
type: string
|
type: string
|
||||||
iptablesLockProbeInterval:
|
iptablesLockProbeInterval:
|
||||||
|
|
@ -311,16 +308,16 @@ spec:
|
||||||
description: 'IptablesPostWriteCheckInterval is the period after Felix
|
description: 'IptablesPostWriteCheckInterval is the period after Felix
|
||||||
has done a write to the dataplane that it schedules an extra read
|
has done a write to the dataplane that it schedules an extra read
|
||||||
back in order to check the write was not clobbered by another process.
|
back in order to check the write was not clobbered by another process.
|
||||||
This should only occur if another application on the system doesn’t
|
This should only occur if another application on the system doesn''t
|
||||||
respect the iptables lock. [Default: 1s]'
|
respect the iptables lock. [Default: 1s]'
|
||||||
type: string
|
type: string
|
||||||
iptablesRefreshInterval:
|
iptablesRefreshInterval:
|
||||||
description: 'IptablesRefreshInterval is the period at which Felix
|
description: 'IptablesRefreshInterval is the period at which Felix
|
||||||
re-checks the IP sets in the dataplane to ensure that no other process
|
re-checks the IP sets in the dataplane to ensure that no other process
|
||||||
has accidentally broken Calico’s rules. Set to 0 to disable IP sets
|
has accidentally broken Calico''s rules. Set to 0 to disable IP
|
||||||
refresh. Note: the default for this value is lower than the other
|
sets refresh. Note: the default for this value is lower than the
|
||||||
refresh intervals as a workaround for a Linux kernel bug that was
|
other refresh intervals as a workaround for a Linux kernel bug that
|
||||||
fixed in kernel version 4.11. If you are using v4.11 or greater
|
was fixed in kernel version 4.11. If you are using v4.11 or greater
|
||||||
you may want to set this to, a higher value to reduce Felix CPU
|
you may want to set this to, a higher value to reduce Felix CPU
|
||||||
usage. [Default: 10s]'
|
usage. [Default: 10s]'
|
||||||
type: string
|
type: string
|
||||||
|
|
@ -371,10 +368,15 @@ spec:
|
||||||
type: string
|
type: string
|
||||||
metadataPort:
|
metadataPort:
|
||||||
description: 'MetadataPort is the port of the metadata server. This,
|
description: 'MetadataPort is the port of the metadata server. This,
|
||||||
combined with global.MetadataAddr (if not ‘None’), is used to set
|
combined with global.MetadataAddr (if not ''None''), is used to
|
||||||
up a NAT rule, from 169.254.169.254:80 to MetadataAddr:MetadataPort.
|
set up a NAT rule, from 169.254.169.254:80 to MetadataAddr:MetadataPort.
|
||||||
In most cases this should not need to be changed [Default: 8775].'
|
In most cases this should not need to be changed [Default: 8775].'
|
||||||
type: integer
|
type: integer
|
||||||
|
mtuIfacePattern:
|
||||||
|
description: MTUIfacePattern is a regular expression that controls
|
||||||
|
which interfaces Felix should scan in order to calculate the host's
|
||||||
|
MTU. This should not match workload interfaces (usually named cali...).
|
||||||
|
type: string
|
||||||
natOutgoingAddress:
|
natOutgoingAddress:
|
||||||
description: NATOutgoingAddress specifies an address to use when performing
|
description: NATOutgoingAddress specifies an address to use when performing
|
||||||
source NAT for traffic in a natOutgoing pool that is leaving the
|
source NAT for traffic in a natOutgoing pool that is leaving the
|
||||||
|
|
@ -445,9 +447,9 @@ spec:
|
||||||
status reports. [Default: 90s]'
|
status reports. [Default: 90s]'
|
||||||
type: string
|
type: string
|
||||||
routeRefreshInterval:
|
routeRefreshInterval:
|
||||||
description: 'RouterefreshInterval is the period at which Felix re-checks
|
description: 'RouteRefreshInterval is the period at which Felix re-checks
|
||||||
the routes in the dataplane to ensure that no other process has
|
the routes in the dataplane to ensure that no other process has
|
||||||
accidentally broken Calico’s rules. Set to 0 to disable route refresh.
|
accidentally broken Calico''s rules. Set to 0 to disable route refresh.
|
||||||
[Default: 90s]'
|
[Default: 90s]'
|
||||||
type: string
|
type: string
|
||||||
routeSource:
|
routeSource:
|
||||||
|
|
@ -468,6 +470,13 @@ spec:
|
||||||
- max
|
- max
|
||||||
- min
|
- min
|
||||||
type: object
|
type: object
|
||||||
|
serviceLoopPrevention:
|
||||||
|
description: 'When service IP advertisement is enabled, prevent routing
|
||||||
|
loops to service IPs that are not in use, by dropping or rejecting
|
||||||
|
packets that do not get DNAT''d by kube-proxy. Unless set to "Disabled",
|
||||||
|
in which case such routing loops continue to be allowed. [Default:
|
||||||
|
Drop]'
|
||||||
|
type: string
|
||||||
sidecarAccelerationEnabled:
|
sidecarAccelerationEnabled:
|
||||||
description: 'SidecarAccelerationEnabled enables experimental sidecar
|
description: 'SidecarAccelerationEnabled enables experimental sidecar
|
||||||
acceleration [Default: false]'
|
acceleration [Default: false]'
|
||||||
|
|
|
||||||
|
|
@ -1,9 +1,6 @@
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
annotations:
|
|
||||||
controller-gen.kubebuilder.io/version: (devel)
|
|
||||||
creationTimestamp: null
|
|
||||||
name: globalnetworkpolicies.crd.projectcalico.org
|
name: globalnetworkpolicies.crd.projectcalico.org
|
||||||
spec:
|
spec:
|
||||||
group: crd.projectcalico.org
|
group: crd.projectcalico.org
|
||||||
|
|
@ -206,7 +203,7 @@ spec:
|
||||||
code:
|
code:
|
||||||
description: Match on a specific ICMP code. If specified,
|
description: Match on a specific ICMP code. If specified,
|
||||||
the Type value must also be specified. This is a technical
|
the Type value must also be specified. This is a technical
|
||||||
limitation imposed by the kernel’s iptables firewall,
|
limitation imposed by the kernel's iptables firewall,
|
||||||
which Calico uses to enforce the rule.
|
which Calico uses to enforce the rule.
|
||||||
type: integer
|
type: integer
|
||||||
type:
|
type:
|
||||||
|
|
@ -235,7 +232,7 @@ spec:
|
||||||
code:
|
code:
|
||||||
description: Match on a specific ICMP code. If specified,
|
description: Match on a specific ICMP code. If specified,
|
||||||
the Type value must also be specified. This is a technical
|
the Type value must also be specified. This is a technical
|
||||||
limitation imposed by the kernel’s iptables firewall,
|
limitation imposed by the kernel's iptables firewall,
|
||||||
which Calico uses to enforce the rule.
|
which Calico uses to enforce the rule.
|
||||||
type: integer
|
type: integer
|
||||||
type:
|
type:
|
||||||
|
|
@ -537,7 +534,7 @@ spec:
|
||||||
code:
|
code:
|
||||||
description: Match on a specific ICMP code. If specified,
|
description: Match on a specific ICMP code. If specified,
|
||||||
the Type value must also be specified. This is a technical
|
the Type value must also be specified. This is a technical
|
||||||
limitation imposed by the kernel’s iptables firewall,
|
limitation imposed by the kernel's iptables firewall,
|
||||||
which Calico uses to enforce the rule.
|
which Calico uses to enforce the rule.
|
||||||
type: integer
|
type: integer
|
||||||
type:
|
type:
|
||||||
|
|
@ -566,7 +563,7 @@ spec:
|
||||||
code:
|
code:
|
||||||
description: Match on a specific ICMP code. If specified,
|
description: Match on a specific ICMP code. If specified,
|
||||||
the Type value must also be specified. This is a technical
|
the Type value must also be specified. This is a technical
|
||||||
limitation imposed by the kernel’s iptables firewall,
|
limitation imposed by the kernel's iptables firewall,
|
||||||
which Calico uses to enforce the rule.
|
which Calico uses to enforce the rule.
|
||||||
type: integer
|
type: integer
|
||||||
type:
|
type:
|
||||||
|
|
|
||||||
|
|
@ -1,9 +1,6 @@
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
annotations:
|
|
||||||
controller-gen.kubebuilder.io/version: (devel)
|
|
||||||
creationTimestamp: null
|
|
||||||
name: globalnetworksets.crd.projectcalico.org
|
name: globalnetworksets.crd.projectcalico.org
|
||||||
spec:
|
spec:
|
||||||
group: crd.projectcalico.org
|
group: crd.projectcalico.org
|
||||||
|
|
|
||||||
|
|
@ -1,9 +1,6 @@
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
annotations:
|
|
||||||
controller-gen.kubebuilder.io/version: (devel)
|
|
||||||
creationTimestamp: null
|
|
||||||
name: hostendpoints.crd.projectcalico.org
|
name: hostendpoints.crd.projectcalico.org
|
||||||
spec:
|
spec:
|
||||||
group: crd.projectcalico.org
|
group: crd.projectcalico.org
|
||||||
|
|
|
||||||
|
|
@ -1,9 +1,6 @@
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
annotations:
|
|
||||||
controller-gen.kubebuilder.io/version: (devel)
|
|
||||||
creationTimestamp: null
|
|
||||||
name: ipamblocks.crd.projectcalico.org
|
name: ipamblocks.crd.projectcalico.org
|
||||||
spec:
|
spec:
|
||||||
group: crd.projectcalico.org
|
group: crd.projectcalico.org
|
||||||
|
|
@ -68,7 +65,6 @@ spec:
|
||||||
- allocations
|
- allocations
|
||||||
- attributes
|
- attributes
|
||||||
- cidr
|
- cidr
|
||||||
- deleted
|
|
||||||
- strictAffinity
|
- strictAffinity
|
||||||
- unallocated
|
- unallocated
|
||||||
type: object
|
type: object
|
||||||
|
|
|
||||||
|
|
@ -1,9 +1,6 @@
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
annotations:
|
|
||||||
controller-gen.kubebuilder.io/version: (devel)
|
|
||||||
creationTimestamp: null
|
|
||||||
name: ipamconfigs.crd.projectcalico.org
|
name: ipamconfigs.crd.projectcalico.org
|
||||||
spec:
|
spec:
|
||||||
group: crd.projectcalico.org
|
group: crd.projectcalico.org
|
||||||
|
|
@ -36,6 +33,10 @@ spec:
|
||||||
properties:
|
properties:
|
||||||
autoAllocateBlocks:
|
autoAllocateBlocks:
|
||||||
type: boolean
|
type: boolean
|
||||||
|
maxBlocksPerHost:
|
||||||
|
description: MaxBlocksPerHost, if non-zero, is the max number of blocks
|
||||||
|
that can be affine to each host.
|
||||||
|
type: integer
|
||||||
strictAffinity:
|
strictAffinity:
|
||||||
type: boolean
|
type: boolean
|
||||||
required:
|
required:
|
||||||
|
|
|
||||||
|
|
@ -1,9 +1,6 @@
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
annotations:
|
|
||||||
controller-gen.kubebuilder.io/version: (devel)
|
|
||||||
creationTimestamp: null
|
|
||||||
name: ipamhandles.crd.projectcalico.org
|
name: ipamhandles.crd.projectcalico.org
|
||||||
spec:
|
spec:
|
||||||
group: crd.projectcalico.org
|
group: crd.projectcalico.org
|
||||||
|
|
@ -38,6 +35,8 @@ spec:
|
||||||
additionalProperties:
|
additionalProperties:
|
||||||
type: integer
|
type: integer
|
||||||
type: object
|
type: object
|
||||||
|
deleted:
|
||||||
|
type: boolean
|
||||||
handleID:
|
handleID:
|
||||||
type: string
|
type: string
|
||||||
required:
|
required:
|
||||||
|
|
|
||||||
|
|
@ -1,9 +1,6 @@
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
annotations:
|
|
||||||
controller-gen.kubebuilder.io/version: (devel)
|
|
||||||
creationTimestamp: null
|
|
||||||
name: ippools.crd.projectcalico.org
|
name: ippools.crd.projectcalico.org
|
||||||
spec:
|
spec:
|
||||||
group: crd.projectcalico.org
|
group: crd.projectcalico.org
|
||||||
|
|
|
||||||
|
|
@ -1,9 +1,6 @@
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
annotations:
|
|
||||||
controller-gen.kubebuilder.io/version: (devel)
|
|
||||||
creationTimestamp: null
|
|
||||||
name: kubecontrollersconfigurations.crd.projectcalico.org
|
name: kubecontrollersconfigurations.crd.projectcalico.org
|
||||||
spec:
|
spec:
|
||||||
group: crd.projectcalico.org
|
group: crd.projectcalico.org
|
||||||
|
|
|
||||||
|
|
@ -1,9 +1,6 @@
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
annotations:
|
|
||||||
controller-gen.kubebuilder.io/version: (devel)
|
|
||||||
creationTimestamp: null
|
|
||||||
name: networkpolicies.crd.projectcalico.org
|
name: networkpolicies.crd.projectcalico.org
|
||||||
spec:
|
spec:
|
||||||
group: crd.projectcalico.org
|
group: crd.projectcalico.org
|
||||||
|
|
@ -195,7 +192,7 @@ spec:
|
||||||
code:
|
code:
|
||||||
description: Match on a specific ICMP code. If specified,
|
description: Match on a specific ICMP code. If specified,
|
||||||
the Type value must also be specified. This is a technical
|
the Type value must also be specified. This is a technical
|
||||||
limitation imposed by the kernel’s iptables firewall,
|
limitation imposed by the kernel's iptables firewall,
|
||||||
which Calico uses to enforce the rule.
|
which Calico uses to enforce the rule.
|
||||||
type: integer
|
type: integer
|
||||||
type:
|
type:
|
||||||
|
|
@ -224,7 +221,7 @@ spec:
|
||||||
code:
|
code:
|
||||||
description: Match on a specific ICMP code. If specified,
|
description: Match on a specific ICMP code. If specified,
|
||||||
the Type value must also be specified. This is a technical
|
the Type value must also be specified. This is a technical
|
||||||
limitation imposed by the kernel’s iptables firewall,
|
limitation imposed by the kernel's iptables firewall,
|
||||||
which Calico uses to enforce the rule.
|
which Calico uses to enforce the rule.
|
||||||
type: integer
|
type: integer
|
||||||
type:
|
type:
|
||||||
|
|
@ -526,7 +523,7 @@ spec:
|
||||||
code:
|
code:
|
||||||
description: Match on a specific ICMP code. If specified,
|
description: Match on a specific ICMP code. If specified,
|
||||||
the Type value must also be specified. This is a technical
|
the Type value must also be specified. This is a technical
|
||||||
limitation imposed by the kernel’s iptables firewall,
|
limitation imposed by the kernel's iptables firewall,
|
||||||
which Calico uses to enforce the rule.
|
which Calico uses to enforce the rule.
|
||||||
type: integer
|
type: integer
|
||||||
type:
|
type:
|
||||||
|
|
@ -555,7 +552,7 @@ spec:
|
||||||
code:
|
code:
|
||||||
description: Match on a specific ICMP code. If specified,
|
description: Match on a specific ICMP code. If specified,
|
||||||
the Type value must also be specified. This is a technical
|
the Type value must also be specified. This is a technical
|
||||||
limitation imposed by the kernel’s iptables firewall,
|
limitation imposed by the kernel's iptables firewall,
|
||||||
which Calico uses to enforce the rule.
|
which Calico uses to enforce the rule.
|
||||||
type: integer
|
type: integer
|
||||||
type:
|
type:
|
||||||
|
|
|
||||||
|
|
@ -1,9 +1,6 @@
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
annotations:
|
|
||||||
controller-gen.kubebuilder.io/version: (devel)
|
|
||||||
creationTimestamp: null
|
|
||||||
name: networksets.crd.projectcalico.org
|
name: networksets.crd.projectcalico.org
|
||||||
spec:
|
spec:
|
||||||
group: crd.projectcalico.org
|
group: crd.projectcalico.org
|
||||||
|
|
|
||||||
|
|
@ -24,3 +24,4 @@ calico_files:
|
||||||
- "calico-node-ServiceAccount.yaml"
|
- "calico-node-ServiceAccount.yaml"
|
||||||
- "calico-kube-controllers-Deployment.yaml"
|
- "calico-kube-controllers-Deployment.yaml"
|
||||||
- "calico-kube-controllers-ServiceAccount.yaml"
|
- "calico-kube-controllers-ServiceAccount.yaml"
|
||||||
|
- "calico-kube-controllers-PodDisruptionBudget.yaml"
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue